Advertisement

Investigating Various Cryptographic Techniques Used in Cloud Computing

  • Ananya Srivastava
  • Aboli Khare
  • Priyaranjan SatapathyEmail author
  • Ayes Chinmay
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 37)

Abstract

Cloud computing is the newest buzzword which is rising in its technology as it has reduced cumbersome efforts spent on building infrastructure, software, hardware, or any form of such resources used in a workplace. However, data security which is of primordial importance still remains a huge challenge during cloud implementation. Many traditional encryption algorithms are there to ensure security such as play fair cipher and DES. But all these algorithms only help in encryption of plain text into cipher text during communication. For data analysis, the data is deciphered on the cloud which acts as easy prey for the hackers. Herein we look up to three techniques of cryptography—homomorphic encryption, verifiable computation, and multi-party computation which have the potential to achieve security goals.

Keywords

Homomorphic encryption Verifiable computation Multi-party computation Cloud computing 

References

  1. 1.
    M. Brenner et al., Practical applications of homomorphic encryption, in ICSC (2012)Google Scholar
  2. 2.
    M. Vdijk et al., Fully homomorphic encryption over the integers, LNCS, vol. 6110, pp. 24–43 (2010)Google Scholar
  3. 3.
    R.A. Carlton, Secure Integer Comparisons Using the Homomorphic Properties of Prime Power Subgroups, Western University Electronic Thesis and Dissertation Repository (2017)Google Scholar
  4. 4.
    W. Stallings, Cryptography and Network Security, 5th edn. (Pearson Education, 2011)Google Scholar
  5. 5.
    P.V. Parmar et al., Survey of various homomorphic encryption algorithms and schemes. IJCA 91 (2014)Google Scholar
  6. 6.
    M. Togan et al., Comparison-based computations over fully homomorphic encrypted data, in COMM, pp. 1–6 (2014)Google Scholar
  7. 7.
    X. Yu et al., A survey of verifiable computation. Mob. Netw. Appl. 22, 438–453 (2017)CrossRefGoogle Scholar
  8. 8.
    H. Ma et al., Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Dependable Secure Comput. 14, 679–692 (2017)Google Scholar
  9. 9.
    R. Gennaro et al., Non-interactive verifiable computing: outsourcing computation to untrusted workers, LNCS, vol. 6223, pp. 465–482 (2010)CrossRefGoogle Scholar
  10. 10.
    J. Swain, R.R. Swain, A. Chinmay, F. Naaz, Job Scheduling Algorithms (2015)Google Scholar
  11. 11.
    S.G. Choi et al., Multi-client non-interactive verifiable computation, LNCS, vol. 7785, pp. 499–518 (2013)CrossRefGoogle Scholar
  12. 12.
    C. Orlandi, Is multiparty computation any good in practice? in ICASSP, pp. 5848–5851 (2011)Google Scholar
  13. 13.
    J. Saia et al., Recent results in scalable multi-party computation, in SOFSEM, pp. 24–44 (2015)zbMATHGoogle Scholar
  14. 14.
    S. Yakoubov et al., A survey of cryptographic approaches to securing big-data analytics in the cloud, in HPEC, pp. 1–6 (2014)Google Scholar
  15. 15.
    M. Walfish et al., Verifying computations without reexecuting them. Commun. ACM 58, 74–84 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Ananya Srivastava
    • 1
  • Aboli Khare
    • 1
  • Priyaranjan Satapathy
    • 1
    Email author
  • Ayes Chinmay
    • 1
  1. 1.Department of Computer Science and EngineeringInternational Institute of Information TechnologyBhubaneswarIndia

Personalised recommendations